d7e7d69565
Merge pull request #197 from matzegebbe/patch-1
...
Update Readme.md
2014-05-13 16:35:21 +01:00
22366489c8
Update Readme.md
...
typo
2014-05-13 17:31:58 +02:00
edb8a4c18e
Merge pull request #189 from dnf/master
...
Added protection against multiple callback invocation on error path
2014-04-02 09:17:18 +01:00
54b958436a
Added protection against multiple callback invocation on error path
2014-04-01 19:05:17 -07:00
324f6d69da
Merge pull request #186 from rebootd/master
...
renamed 'OAuth' -> 'oauth' to be linux friendly in the readme
2014-03-24 16:13:15 +00:00
48033df3e4
renamed 'OAuth' -> 'oauth' to be linux friendly in the readme
2014-03-23 19:38:03 -07:00
171e668f38
Bumping version to 0.9.11
2014-01-04 14:49:01 +00:00
d228aebb0b
Merge pull request #121 from knechtandreas/master
...
Add RSA-SHA1 support
2014-01-04 06:37:26 -08:00
631ab09b5b
Merge pull request #138 from pjvds/no-follow-option
...
Don't follow redirects opt-out
2014-01-04 06:27:32 -08:00
4d8bf8ba5f
Merge pull request #140 from AndrewMartens/master
...
Set default User-Agent if not otherwise specified in customHeaders
2014-01-04 06:17:49 -08:00
d8d3f9c8fc
Merge pull request #154 from bradgignac/remove-type-parameter
...
Remove type query parameter from OAuth2 requests.
2014-01-04 06:07:19 -08:00
8658d7d55b
Remove type query parameter from OAuth2 requests.
...
While the type parameter was required in older versions of the OAuth2
specification, it was removed in version 8. Currently, this breaks OAuth2
against the Dropbox API. Closes #127 .
http://tools.ietf.org/html/draft-ietf-oauth-v2-08#section-4.1.1
2013-07-27 18:42:14 -04:00
a742d838f5
Set default User-Agent if not otherwise specified in customHeaders
2013-05-07 14:38:04 -07:00
3584b43bd2
Add test to proof default value for followRedirects is true
2013-05-06 09:41:01 +02:00
f24590182c
Remove trailing whitespaces
2013-05-06 08:42:23 +02:00
d4143a6452
Add followRedirect client option to turn auto follow on or off
2013-05-05 23:04:10 +02:00
04eb6fade3
Add test cases for 302 response status
2013-04-12 13:28:07 +02:00
6e215f9ad7
Add failing test for 301 redirect for followRedirect client option
2013-04-12 13:24:15 +02:00
3fc9c63a06
Update Readme.md
...
quote mismatch
2013-03-21 17:24:20 -07:00
08569a220a
Update Readme.md
...
added OAuth 1.0 example
2013-03-21 17:23:33 -07:00
11ed5943ee
Update Readme.md
2013-03-21 17:14:49 -07:00
46e84faa1a
Update Readme.md
...
changed to user one require
2013-03-21 17:13:31 -07:00
c161653add
Update Readme.md
...
added test/example to get bearer/access_token from Twitter using consumer key+secret and OAuth2
2013-03-21 17:12:11 -07:00
37bf1081ea
Updated contributor list
2013-03-05 18:08:38 +00:00
301ebab90c
Added an extra test, and checked realHeaders to catch any dodgy custom ones
2013-03-05 18:07:40 +00:00
8be23c309c
Merge remote-tracking branch 'jfromaniello/bug129'
2013-03-05 17:43:51 +00:00
a295a66b60
Bumps package version to 0.9.10
2013-03-05 17:40:21 +00:00
03d713be9a
Fixes Issue #129
...
Not ideal, but effectively reverts the default behaviour of the library to how 0.9.8 worked,
that is it passes the access_token as a query parameter to the server.
To allow the utility 'get' method to use an Authorization header *instead* then you need to
explicitly enable this behaviour by using the method :
var oa= new Oauth(...);
oa.useAuthorizationHeaderforGET(true)
Note this can/should be used in conjunction with the other utility method:
oa.setAuthMethod(...)
The default value for the Authorization header is 'Bearer'
If you're building your own requests using oa._request then there is a new exported
method:
oa.buildAuthHeader(token)
2013-03-05 17:34:20 +00:00
ba81ad43bd
Fixes Issue #125 - Abusing externally passed in data structure
...
Also had to re-jig the test, as it turns out the contributor-supplied test
for this work didn't *actually* test anything :(
2013-03-05 17:00:35 +00:00
798157c185
fix #129 Setting token in query params and Authorization header violates spec
2013-03-05 04:04:00 -03:00
08fcb6881a
Upping version to 0.9.9
2013-03-01 20:08:28 +00:00
635ee2c1f7
Added RSA-SHA1 signature method based on the fork from https://github.com/wraithgar/node-oauth . Added test that uses the RSA-SHA1 method and verifies the signature using a public key.
2012-12-20 10:09:56 +01:00
45a983e6dc
Merge pull request #114 from rolandboon/master
...
Fix requests containing !'()* in POST data
2012-11-25 07:28:31 -08:00
282733a27f
Merge pull request #116 from yaru22/master
...
Adding post_headers parameter to getOAuthAccessToken method.
2012-11-25 07:25:02 -08:00
efbce5bd68
Add in Authorization Header and support extra headers by default.
2012-11-21 10:29:30 -05:00
240a992553
Update lib/oauth.js
...
Fix the mismatch between the output of querystring.stringify() and this._encodeData().
2012-09-28 12:59:59 +03:00
a846c282a9
Oops, my Readme.md wasn't consistent with the other lines
2012-07-28 13:49:52 +01:00
bd90c0fbf5
Bump version to 0.9.8 and update release notes
2012-07-28 13:45:19 +01:00
3a15f03c34
Merge pull request #101 from GCheung55/patch-1
...
Update to make sure hostName exists before trying to act on it
2012-07-28 05:33:46 -07:00
b103b70210
Add a test for Issue #105
2012-07-28 13:32:09 +01:00
d43a712548
Merge remote-tracking branch 'chrischw/master'
2012-07-28 13:25:12 +01:00
9db835000e
The fix for Issue #64 implies that the test server I've been using is wrong
2012-07-28 13:10:00 +01:00
b03f6ae424
Remove excess double URL encoding introduced by fixes for issue #64
2012-07-28 13:09:32 +01:00
92aa1cf2c2
Merge remote-tracking branch 'jrozner/master'
2012-07-28 13:07:06 +01:00
5fab3c577e
Added an option to change the OAuth parameter seperator
2012-07-07 00:56:39 +02:00
a7c1e94e71
Merge pull request #103 from gregjacobson/master
...
Add a section in the Readme for installation instructions
2012-06-29 16:54:14 -07:00
827351072b
Added installation instructions
...
There are number of oauth solutions for node.js and it is
helpful to provide the official installation instructions
in the Readme file. Installation instructions can be a little
confusing for this module because the github repository name
is node-oauth and there is a different node.js oauth
solution that isntalls via npm with the command node-oauth.
Since this solution installs with oauth official
instructions may be helpful to some developers.
2012-06-29 11:52:00 -04:00
409405f674
Update to make sure hostName exists before trying to act on it. Otherwise it will throw an error.
2012-06-11 11:36:31 -07:00
d8d1e0bad7
fixed issue #64 w/ tests
2012-06-07 10:44:54 -07:00
03a82b31e4
Updating version to 0.9.7
2012-04-24 22:26:10 +01:00